HTTPS-finder擴展強制Firefox加密瀏覽v0.86
HTTPS Finder是一個firefox瀏覽器擴展,這個外掛程式的作用就是發現網站支持https連接時提醒你並設置成自動換到https加密連接,與前文介紹的HTTPS everywhere擴展功能基本相同,HTTPS Finder還可以為https everywhere自動添加https瀏覽規則,這對於國內複雜的網路環境還是有一點用的
在這裡可以看到更多的支持FF4的外掛程式 https://linux.softpedia.com/get/Internet/Firefox-Extensions/
官方項目主頁:https://code.google.com/p/https-finder/
firefox官方外掛程式下載頁:https://addons.mozilla.org/en-us/firefox/addon/https-finder/
2012-3-2 更新 v0.86,官方下載:
安全提醒:
1、因為HTTPS Finder強制https加密訪問時,是在探測http非加密某個網頁之後,所以,在ssl加密之前傳送的cookie可能還是非加密的http,這就可能不能防止Firesheep或中間人攻擊,不過擴展還是最大限度地減少這種情況發生的機會。
2、HTTPS Finder對HTTPS的搜尋只檢測具有良好的有效證書者,並不能保證在伺服器端實現安全的SSL。
最好的使用方法:
HTTPS Finder是最強大的使用方法就是與HTTPS everywhere配合使用。如果單獨使用也可以,有它總比沒有好。
類似功能的擴展還有:
https://addons.mozilla.org/zh-CN/firefox/addon/force-tls/
原文標題:HTTPS-finder擴展強制Firefox加密瀏覽v0.86 - 美博園
美博園文章均為「原創 - 首發」,請尊重辛勞撰寫,轉載請以上面完整鏈接註明來源!
軟體著作權歸原作者!個別轉載文,本站會註明為轉載。
網 友 留 言
11條評論 in “HTTPS-finder擴展強制Firefox加密瀏覽v0.86”這裡是你留言評論的地方
Uploaded: Mar 1 (3 days ago)
https://code.google.com/p/https-finder/downloads/detail?name=httpsfinder086.xpi&can=2&q=
"File:
httpsfinder086.xpi 71.7 KB
Description:
-- Fixed issue 42: No Ok/cancel buttons to exit preference window (bug affected OS X only).
SHA1 Checksum: b2070de9f6532da7b0f74adfcbc88d56b43e6c8b What's this?"
https://code.google.com/p/https-finder/downloads/list
"httpsfinder081d1.xpi HTTPS Finder 0.81d1 3 days ago 3 days ago 67.5 KB "
https://code.google.com/p/https-finder/downloads/detail?name=httpsfinder081d1.xpi&can=2&q=
"File:
httpsfinder081d1.xpi 67.5 KB
Description:
Development build: Tested in Win7 x64 and Ubuntu 11.10 x64
Compatibility: Firefox 4.0-11.0a2
Changes since 0.80d2:
-- Fixed bug where whitelisted domains could be removed from whitelist during runtime.
-- Fixed bug where Preference window Enable/Disable toggle would not re-enable correctly all the time.
-- **Feedback requested:** Added feature to set secure cookie flags on valid HTTPS domain cookies. Disabled by default, enable in Preferences > Advanced > "Secure cookies for valid HTTPS domains". Only works on cookies for the exact detected domain (e.g. ".domain.com" cookies are not secured for detected "https://www.domain.com"). Clicking the "Add to whitelist" or "Not Now" button on the alert drop down restores secured cookies to their original insecure state. I'm not sure if this feature will cause problems/unexpected behavior, nor is it perfect since we can't apply an aggressive securing policy to all domains. I'm very interested in feedback on this feature: email httpsfinder@gmail.com "
https://code.google.com/p/https-finder/downloads/list
"httpsfinder080d2.xpi HTTPS Finder 0.80d2 Dec 7 Dec 7 68.0 KB "
https://code.google.com/p/https-finder/downloads/detail?name=httpsfinder079dev3.xpi&can=2&q=
" httpsfinder079dev3.xpi 69.7 KB
Description:
Development build:
Compatibility: Firefox 4.0-9.0a2
Changes since 0.78:
-- Fixed improper character encoding in zh-CN locale (bug introduced in 0.78dev)
-- Added hidden pref to alert when a self-signed certificate is present. I've had multiple requests, but it will most likely remain a hidden setting since most people probably shouldn't use it. Go to about:config, and enable "extensions.httpsfinder.allowSelfSignedCerts". Auto-enforce won't happen since it would degrade experience (cert errors), but a special alert will appear, allowing you to go to HTTPS or whitelist.
The alert string is only in English for now - will get it translated before next release."
更新了,謝謝
https://code.google.com/p/https-finder/downloads/list
"https_finder-0.77-fx.xpi HTTPS Finder 0.77 Featured 9 hours ago 9 hours ago 69.0 KB "
New ver.: httpsfinder 076.xpi :
https://code.google.com/p/https-finder/downloads/detail?name=httpsfinder076.xpi&can=2&q=
https://addons.mozilla.org/en-US/firefox/addon/force-tls/
"Force-TLS allows web sites to tell Firefox that they should be served via HTTPS in the future; this helps secure you from accidentally negotiating an insecure session with certain sites. Force-TLS is also compatible with Strict Transport Security."
"ForceTLS is an adaptation of the ForceHTTPS protocol by Collin Jackson and Adam Barth, which supports a simple HTTP header in forcing automatic connections to HTTPS connections in the future. Here's how it works:
1. A site x.com served via HTTPS provides a Strict-Transport-Security HTTP header in its response. The header contains a max-age value (how long to remember the forced security) and optionally an includeSubDomains flag.
2. The browser receives this header and adds it to a Force TLS database.
3. In the future, any requests to x.com are modified to be via HTTPS if they are attempted through HTTP before the request hits the network.
4. If any subdomains *.x.com are requested via HTTP and the includeSubDomains flag was set, they are also forced to be HTTPS.
Use this add-on to extend Firefox so that it will listen to Strict-Transport-Security suggestions from web servers. This add-on will enforce secure connections for sites that use the Strict-Transport-Security header.
You can also use the add-on to add your own forcing rules -- to be sure you always visit your favorite sites over HTTPS."
https://code.google.com/p/force-tls/
https://forcetls.sidstamm.com/